Microsoft Research330 тыс
Опубликовано 7 сентября 2016, 17:34
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position
Свежие видео
OUKITEL - G2 Underwater Extreme Test: Proving the Power of Waterproof Durability! #oukitel #unboxing